Hardware- and software-based security protects the full stack and guarantees trust for your critical workloads running with ARCA Trusted OS.
Hardware-based security sets the root of trust of the system into a physical device (TPM), provides increased authenticity and verifiability against rogue OS, and is tamper evident.
UEFI used for secure boot of CYSEC ARCA
TPM decrypts data and partition systems when a trusted kernel is booted
A CPU with secure enclave; enables confidential computing
HSM/SE; FIPS-140-2 L3 HSM
SE integrates Common Criteria EAL4 and certified root of trust
Any interference leads to kernel lockdown
Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.
METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data.